US11225222B2 - Vehicle access and power management systems and methods via machine learning - Google Patents
Vehicle access and power management systems and methods via machine learning Download PDFInfo
- Publication number
- US11225222B2 US11225222B2 US16/377,697 US201916377697A US11225222B2 US 11225222 B2 US11225222 B2 US 11225222B2 US 201916377697 A US201916377697 A US 201916377697A US 11225222 B2 US11225222 B2 US 11225222B2
- Authority
- US
- United States
- Prior art keywords
- vehicle
- identification device
- environment
- pattern
- recited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
- B60R25/241—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user whereby access privileges are related to the identifiers
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/01—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/30—Detection related to theft or to other events relevant to anti-theft systems
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/40—Features of the power supply for the anti-theft system, e.g. anti-theft batteries, back-up power supply or means to save battery power
- B60R25/403—Power supply in the vehicle
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B81/00—Power-actuated vehicle locks
- E05B81/54—Electrical circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/1003—Alarm systems characterised by arm or disarm features
Definitions
- This disclosure is directed generally to vehicle access systems, and more particularly to vehicle access and power management systems and methods via machine learning.
- Vehicles communicate with identification devices through a variety of communication interfaces.
- Vehicles and identification devices include environment detection sensors.
- a method for access to a vehicle includes receiving data from an identification device related to at least one device environment sensor of the identification device. At least one pattern associated with the received data is identified. An environment of the identification device based on feedback from the at least one device environment sensor is determined. The environment to the at least one pattern is compared. In response to the comparing step, access to the vehicle is allowed or denied.
- the method includes, in response to the comparing step, altering a search and listen pattern between the vehicle and the identification device.
- the method includes, in response to the comparing step, changing a power condition of a device of the vehicle.
- the device is a transceiver associated with a communication interface between the vehicle and the identification device.
- changing a power condition includes powering up the device.
- changing a power condition includes powering down the device.
- the method includes receiving data from the vehicle related to at least one vehicle environment sensor of the vehicle, identifying a second pattern associated with the received vehicle environment data, determining a vehicle environment of the vehicle based on feedback from the at least one vehicle environment sensor, and comparing the vehicle environment to the second pattern, and the allowing or denying access step is in response to the comparing the vehicle environment step.
- the identifying the pattern step is performed using machine learning.
- the machine learning utilizes an algorithm and model programmed into an ECU system of the vehicle.
- a method for power management of a vehicle includes receiving data from an identification device related to at least one device environment sensor of the identification device.
- the method includes identifying at least one pattern associated with the received data.
- the method includes determining an environment of the identification device based on feedback from the at least one device environment sensor.
- the method includes, comparing the environment to the at least one pattern.
- the method includes, in response to the comparing, changing a power condition of a device of the vehicle.
- the device is a transceiver associated with a communication interface between the vehicle and the identification device.
- the changing a power condition includes powering up the device.
- the changing a power condition includes powering down the device.
- the method in response to the comparing step, includes altering a search and listen pattern between the vehicle and the identification device.
- the method includes identifying that the identification device is stationary and charging and reducing a frequency of a search and listen pattern between the vehicle and the identification device.
- a power management and access system for a vehicle includes an ECU system. At least one lock is in communication with the ECU system. One or more devices is in communication with the ECU system.
- the ECU system is configured to utilize machine learning to receive data from an identification device related to at least one device environment sensor of the identification device, identify at least one pattern associated with the received data, determine an environment of the identification device based on feedback from the at least one device environment sensor, compare the environment to the at least one pattern, and, in response to the comparison, send a signal to control the at least one lock to allow or deny access to the vehicle.
- the ECU system is configured to change a power condition of the one or more devices in response to the comparison.
- the ECU system is configured to alter a search and listen pattern between the vehicle and the identification device in response to the comparison.
- FIG. 1 schematically illustrates an example vehicle access system.
- FIG. 2 schematically illustrates communication of the example vehicle access system of FIG. 1 .
- FIG. 3 schematically illustrates example interfaces and environment sensors of a vehicle.
- FIG. 4 schematically illustrates example interfaces and environment sensors of an identification device.
- FIG. 5 illustrates a flowchart of an example method for access of a vehicle.
- FIG. 6 illustrates a flowchart of an example method for power management of a vehicle.
- FIG. 1 schematically illustrates an example vehicle access and power management system 10 in a vehicle 12 .
- the vehicle 12 may include one or more locks 14 , such as door locks in the example shown, operable to engage or disengage to deny or allow access to the vehicle 12 .
- the locks 14 are controllable by control signals from an engine control unit (ECU) system 16 .
- the ECU system 16 may include one or more individual electronic control units that control one or more electronic systems or subsystems within the vehicle 12 .
- the ECU system 16 includes a vehicle access rights management electronic control unit.
- two locks 14 are shown in the illustrative example, more or fewer locks 14 may be utilized.
- the ECU system 16 communicates with an identification device 24 , in some examples to allow or deny access to the vehicle 12 , as explained further below.
- Some example identification devices 24 may include smartphones or other handheld or wearable devices.
- the ECU system 16 may alternatively or additionally be in communication to change the power condition of devices 18 , such as powering up and/or powering down the devices 18 , as shown schematically.
- the devices 18 are transceivers associated with interfaces 26 of communication between the ECU system 16 and the identification device 24 .
- the ECU system 16 may change the power condition of a device 18 based on communication with the identification device 24 .
- the ECU system 16 may include one or more processors that executes, and memory that stores, computer-executable instructions for performing the various methods, functions, protocols, procedures, etc., described herein.
- the memory may include volatile, non-volatile memory, solid state memory, flash memory, random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electronic erasable programmable read-only memory (EEPROM), other variants, combinations thereof, and/or any other type(s) of memory suitable for providing the described functionality and/or storing computer-executable instructions for execution by the processor.
- RAM random-access memory
- ROM read-only memory
- PROM programmable read-only memory
- EPROM erasable programmable read-only memory
- EEPROM electronic erasable programmable read-only memory
- FIG. 2 schematically illustrates communication between the vehicle 12 and the identification device 24 through one or more interfaces 26 .
- Example interfaces 26 may include one or more of LTE, Wi-Fi, Bluetooth Low Energy (BLE), Near-field communication, Qi, and GPS.
- the vehicle 12 includes one or more vehicle environment sensors 28 .
- the identification device 24 includes one or more identification device environment sensors 30 .
- the vehicle 12 and the identification device 24 may communicate data based on readings from the sensors 28 , 30 .
- the ECU system 16 is in communication with the identification device 24 and the vehicle environment sensors 28 .
- the ECU system 16 can allow or deny access to the vehicle 12 , change a power condition (e.g., power up or power down) of certain functions of the vehicle 12 to conserve power, and/or alter a search and listen pattern, in which the vehicle 12 periodically sends signals to and receives signals from the identification device 24 .
- a power condition e.g., power up or power down
- a search and listen pattern in which the vehicle 12 periodically sends signals to and receives signals from the identification device 24 .
- the interfaces 26 A of the vehicle 12 may include LTE 31, Wi-Fi 32, BLE 34, GPS 36, Qi 38, and Near-field communication 40 .
- the vehicle environment sensors 28 may include one or more of a temperature sensor 42 , a light sensor 44 , a camera 46 , a radar sensor 48 , a microphone 50 , and an ultrasonic sensor 52 .
- Other sensors 28 and interfaces 26 A may be used in some examples.
- the interfaces 26 B of the identification device 24 may include LTE 31, Wi-Fi 32, BLE 34, GPS 36, Qi 38, and Near-field communication 40 .
- the device environment sensors 30 may include one or more of a microphone 54 , a temperature sensor 56 a light sensor 58 , a camera 60 , an accelerometer 62 , and a gyroscope 64 .
- Other sensors 30 and interfaces 26 B may be used in some examples.
- Interface 26 selection and sensor 28 , 30 utilization can vary for each environment that the vehicle 12 and identification device 24 are located in.
- information from the sensors 28 , 30 can indicate the proximity of the vehicle 12 to the identification device 24 .
- the system 10 analyzes this data to determine whether the vehicle 12 and identification device 24 are in close proximity to one another, which can be used to allow or deny access to the vehicle 12 , to change a power condition of certain functions of the vehicle 12 to use less power, and/or to alter a search and listen pattern.
- the system 10 utilizes machine learning to learn from data from the sensors 28 , 30 , identify patterns associated with the data, and make decisions to execute various vehicle 12 functions with minimal human intervention.
- the system 10 such as through the ECU system 16 , may use machine learning to understand paths and environment transitions of the identification device 24 after leaving the vehicle 12 and execute various vehicle functions in response.
- the system 10 may utilize machine learning to receive data from an identification device 24 from one or more of the sensors 30 , identify one or more patterns associated with the received data, determine an environment of the identification device 24 based on feedback from the one or more sensors 30 , compare the environment to the one or more patterns, and, in response, allow or deny access to the vehicle 12 .
- the vehicle may change the power condition of a device 18 .
- the vehicle 12 may alter a search and listen pattern relative to the identification device 24 .
- the machine learning may be based on data received from vehicle environment sensors 28 .
- the system 10 may use machine learning based on sensor status, real time changes to vehicle 12 and identification device 24 environments, and historical data to predict proximity of the vehicle 12 and the identification device 24 .
- the system 10 may know through machine learning that the identification device 24 will not be used to gain access to the vehicle 12 for some time, and may deny access to the vehicle 12 , power down devices 18 , and/or reduce a polling frequency of a search and listen pattern to conserve power.
- FIG. 5 illustrates a flowchart of an example method 100 for access of a vehicle 12 , that may be utilized with the system 10 disclosed.
- the method 100 includes, at 102 , receiving data from an identification device 24 from one or more device environment sensors 30 .
- the method 100 includes identifying one or more patterns associated with the received data.
- the method 100 includes determining an environment of the identification device 24 based on feedback from the one or more device environment sensors 30 .
- the method 100 includes comparing the environment to the one or more patterns.
- the method 100 includes, in response to the step 108 , allowing or denying access to the vehicle 12 .
- One or more of the steps of the method 100 be performed utilizing machine learning, such as with the ECU system 16 in some examples.
- the method 100 includes, in response to step 108 , altering a search and listen pattern between the vehicle and the identification device. In some examples, the method 100 includes, in response to step 108 , changing a power condition of a device 18 .
- the method 100 may be based on vehicle environment sensor 28 data.
- the method 100 may include receiving data from the vehicle 12 related to one or more vehicle environment sensors 28 of the vehicle 12 , identifying a second pattern associated with the received vehicle environment data, determining a vehicle environment of the vehicle 12 based on feedback from the one or more vehicle environment sensors, and comparing the vehicle environment to the second pattern.
- the allowing or denying access step may be in response to the comparing the vehicle environment step.
- FIG. 6 illustrates a flowchart of an example method 200 for power management of a vehicle 12 , that may be utilized with the system 10 disclosed.
- the method 200 includes, at 202 , receiving data from an identification device 24 from one or more device environment sensors 30 .
- the method 200 includes identifying one or more patterns associated with the received data.
- the method 200 includes determining an environment of the identification device 24 based on feedback from the one or more device environment sensors 30 .
- the method 200 includes comparing the environment to the one or more patterns.
- the method 200 includes, in response to the step 208 , changing a power condition of a device 18 of the vehicle 12 .
- the method 200 includes, at 212 , in response to 208 , altering a search and listen pattern between the vehicle 12 and the identification device 24 .
- Steps from the method 100 and the method 200 may be combined in some examples.
- the identification device 24 may be within close proximity to the vehicle 12 .
- the system 10 may utilize machine learning to understand that the identification device 24 should not be expected to be used to gain access to the vehicle 12 soon.
- the system may learn this from a detection that the identification device 24 is stationary and/or a detection that the identification device 24 is charging. For example, instead of keeping the search strategy in a quick response mode, if the identification device 24 is not moving or sitting on a wireless charging pad, based on feedback from various device environment sensors 30 , then the vehicle 12 can switch into a longer search and listen pattern until the identification device 24 notifies the vehicle 12 of a status or environment change.
- the system 10 may consider the time of day when the identification device 24 would normally start to be utilized.
- temperature sensors 42 , 56 and light sensors 44 , 58 on the identification device 24 and the vehicle 12 can be compared for alignment to see if both vehicle 12 and device 24 are in the same environment, such as an indoor or outdoor environment.
- the light sensor 58 can gate the temperature sensor 56 to know if the device is in pocket, bag, or out in the open.
- microphones 50 , 54 can monitor the level of noise in the background, which can be used to compare the noise environment of the vehicle 12 to the noise environment to the identification device 24 .
- one or more of accelerometer 62 , compass & gyroscope 64 data can be used to track how the identification device 24 moved toward and/or away from the vehicle 12 . These sensors used to classify walking, running, standing, etc.
- radars and ultrasonic tracking can monitor the path of motion of the user and compare this with the identification device 24 path determination.
- the vehicle 12 can use its sensors 28 , such as Advanced Driver Assist Sensors like cameras, RADAR, and LiDAR, to observe the trajectory the user takes take when leaving the vehicle 12 . With repeated visits to the same location, which may be sensed with GPS in some examples, the vehicle 12 can begin to predict the departure path, time to return, and approach path of the authorized user.
- the identification device 24 may also have sensors 30 tracking the path as the identification device 24 leaves the vehicle 12 .
- the identification device 24 can then collect the sensor 30 data over repeated visits to predict which sensor inputs are principle components to an algorithm that reliably classifies segments of the path and which of those segments can be used in an algorithm to predict a trajectory of the identification device 24 , such as when the user will return to the vehicle 12 .
- the pairings of the observed trajectory from the vehicle 12 and the sensed trajectory of the device 24 may vary from day to day, such as when the user parks in various nearby locations and enters or exits through a variety of access points of their destination.
- the identification device 24 shares its prediction of when and how it expects the user to be on his or her way to return to the vehicle 12 . This sharing may be accomplished via indirect or direct means, depending on the proximity of the identification device 24 and the vehicle 12 .
- Once the vehicle 12 has a high confidence input from the identification device 24 on a returning trajectory of the user it can use its relevant sensors 28 and devices 18 , such as wireless receivers, to confirm the approach of the user and the identification device 24 .
- the path segment classification may occur locally on the identification device 24 , on an algorithm on the vehicle 12 , or on a cloud service that incorporates data from many users and vehicles to continually tune a generic algorithm.
- algorithm tuning benefits from large anonymous populations of users with highly correlated data for a given location.
- a set of algorithms may be highly optimized for the identification devices 24 and vehicles 12 parked in large common locations and are available to be exchanged with the vehicle 12 and the identification devices 24 in those areas. Blended approaches may also be achieved where locations are classified as public or private.
- users may hold their path data and associated approach algorithms within their devices 24 and vehicles 12 for private locations and share those where they can benefit from and contribute to the crowdsourced solutions.
- the system 10 may prioritize among multiple authorized users.
- the vehicle 12 may have a confidence level for each potential user and manage its sensor state according to their proximity For instance, if one user leaves the vehicle 12 in a long term parking situation and uses another form of transportation to move significantly farther away than the other authorized users, then the vehicle 12 prepares for the most relevant case of the nearest authorized user to approach.
- the system 10 may focus on the prioritized user for the search and listen function.
- the system 10 may default to a polling or search strategy that matches with a “closest authorized user” priority; however, the system 10 would have the capability to invert the priority to force the system to set the search strategy to a lower power mode based on the request of the last user who has to return to the vehicle 12 on a very specific path which takes more time into consideration. Based on the changing schedules, the priority may be restored on request. This will have the effect of enabling a much lower power state and reduced availability of the wireless access systems to attack. The other authorized users with sufficient permissions are also able restore their “on approach” confidence threshold as needed.
- the system 10 may learn that a first authorized user's device 24 is in close proximity to the vehicle 12 , and a second authorized user's device 24 is located farther away, such as in another city, state, province, country, etc. In these examples, the vehicle 12 may choose not to react to the second authorized user's device 24 .
- Vehicles 12 and identification devices 24 can further enhance the proximity detection through their ability to recognize changes in their environments to determine if the search and listen functions of the access system should be available and authorize actions. This could be any combination of wireless interface measurements or environment detection sensors available to the vehicle and the smart device.
- the system 10 can adapt the search and listen management to the environmental state, changes through that environment, user behaviors on the path through the environment, and historical data on paths through the environment.
- the systems and methods disclosed provide enhanced access, security, and power management through the use of machine learning.
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Evolutionary Computation (AREA)
- Data Mining & Analysis (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Artificial Intelligence (AREA)
- Electric Propulsion And Braking For Vehicles (AREA)
Abstract
Description
Claims (17)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/377,697 US11225222B2 (en) | 2018-12-20 | 2019-04-08 | Vehicle access and power management systems and methods via machine learning |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201862782457P | 2018-12-20 | 2018-12-20 | |
| US16/377,697 US11225222B2 (en) | 2018-12-20 | 2019-04-08 | Vehicle access and power management systems and methods via machine learning |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20200198577A1 US20200198577A1 (en) | 2020-06-25 |
| US11225222B2 true US11225222B2 (en) | 2022-01-18 |
Family
ID=71098369
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/377,697 Active 2040-01-06 US11225222B2 (en) | 2018-12-20 | 2019-04-08 | Vehicle access and power management systems and methods via machine learning |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US11225222B2 (en) |
Citations (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5969433A (en) * | 1997-04-23 | 1999-10-19 | Maggiora; David Raymond | Theft preventing and deterring system and method using a remote station |
| US20150298654A1 (en) * | 2013-08-19 | 2015-10-22 | Raymond Anthony Joao | Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles |
| US9986084B2 (en) * | 2012-06-21 | 2018-05-29 | Cellepathy Inc. | Context-based mobility stoppage characterization |
| US10147004B2 (en) * | 2011-05-03 | 2018-12-04 | Ionroad Technologies Ltd. | Automatic image content analysis method and system |
| US10169678B1 (en) * | 2017-12-21 | 2019-01-01 | Luminar Technologies, Inc. | Object identification and labeling tool for training autonomous vehicle controllers |
| US10193695B1 (en) * | 2018-04-30 | 2019-01-29 | Merck Patent Gmbh | Methods and systems for automatic object recognition and authentication |
| US10192171B2 (en) * | 2016-12-16 | 2019-01-29 | Autonomous Fusion, Inc. | Method and system using machine learning to determine an automotive driver's emotional state |
| US10328896B2 (en) * | 2017-05-18 | 2019-06-25 | Ford Global Technologies, Llc | Vehicle theft avoidance systems and associated methods |
| US20190220010A1 (en) * | 2018-01-12 | 2019-07-18 | Toyota Research Institute, Inc. | Systems and methods for incentivizing user-aided improvement of autonomous vehicle control systems and methods of operating a vehicle using the same |
| US20190250626A1 (en) * | 2018-02-14 | 2019-08-15 | Zoox, Inc. | Detecting blocking objects |
| US10414377B2 (en) * | 2014-06-11 | 2019-09-17 | Veridium Ip Limited | System and method for facilitating user access to vehicles based on biometric information |
| US10503990B2 (en) * | 2016-07-05 | 2019-12-10 | Nauto, Inc. | System and method for determining probability that a vehicle driver is associated with a driver identifier |
| US10539660B2 (en) * | 2016-04-29 | 2020-01-21 | GM Global Technology Operations LLC | Self-learning system for reflective environments |
| US10546441B2 (en) * | 2013-06-04 | 2020-01-28 | Raymond Anthony Joao | Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles |
| US10562492B2 (en) * | 2002-05-01 | 2020-02-18 | Gtj Ventures, Llc | Control, monitoring and/or security apparatus and method |
| US10745018B2 (en) * | 2018-09-19 | 2020-08-18 | Byton Limited | Hybrid user recognition systems for vehicle access and control |
| US10755083B2 (en) * | 2018-05-04 | 2020-08-25 | Hyundai Motor Company | Terminal for vehicle and method for authenticating face |
-
2019
- 2019-04-08 US US16/377,697 patent/US11225222B2/en active Active
Patent Citations (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5969433A (en) * | 1997-04-23 | 1999-10-19 | Maggiora; David Raymond | Theft preventing and deterring system and method using a remote station |
| US10562492B2 (en) * | 2002-05-01 | 2020-02-18 | Gtj Ventures, Llc | Control, monitoring and/or security apparatus and method |
| US10147004B2 (en) * | 2011-05-03 | 2018-12-04 | Ionroad Technologies Ltd. | Automatic image content analysis method and system |
| US9986084B2 (en) * | 2012-06-21 | 2018-05-29 | Cellepathy Inc. | Context-based mobility stoppage characterization |
| US20190082047A1 (en) * | 2012-06-21 | 2019-03-14 | Cellepathy Inc. | Device context determination |
| US10546441B2 (en) * | 2013-06-04 | 2020-01-28 | Raymond Anthony Joao | Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles |
| US20150298654A1 (en) * | 2013-08-19 | 2015-10-22 | Raymond Anthony Joao | Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles |
| US10414377B2 (en) * | 2014-06-11 | 2019-09-17 | Veridium Ip Limited | System and method for facilitating user access to vehicles based on biometric information |
| US10539660B2 (en) * | 2016-04-29 | 2020-01-21 | GM Global Technology Operations LLC | Self-learning system for reflective environments |
| US10503990B2 (en) * | 2016-07-05 | 2019-12-10 | Nauto, Inc. | System and method for determining probability that a vehicle driver is associated with a driver identifier |
| US10192171B2 (en) * | 2016-12-16 | 2019-01-29 | Autonomous Fusion, Inc. | Method and system using machine learning to determine an automotive driver's emotional state |
| US10328896B2 (en) * | 2017-05-18 | 2019-06-25 | Ford Global Technologies, Llc | Vehicle theft avoidance systems and associated methods |
| US10169678B1 (en) * | 2017-12-21 | 2019-01-01 | Luminar Technologies, Inc. | Object identification and labeling tool for training autonomous vehicle controllers |
| US20190220010A1 (en) * | 2018-01-12 | 2019-07-18 | Toyota Research Institute, Inc. | Systems and methods for incentivizing user-aided improvement of autonomous vehicle control systems and methods of operating a vehicle using the same |
| US20190250626A1 (en) * | 2018-02-14 | 2019-08-15 | Zoox, Inc. | Detecting blocking objects |
| US10193695B1 (en) * | 2018-04-30 | 2019-01-29 | Merck Patent Gmbh | Methods and systems for automatic object recognition and authentication |
| US10755083B2 (en) * | 2018-05-04 | 2020-08-25 | Hyundai Motor Company | Terminal for vehicle and method for authenticating face |
| US10745018B2 (en) * | 2018-09-19 | 2020-08-18 | Byton Limited | Hybrid user recognition systems for vehicle access and control |
Also Published As
| Publication number | Publication date |
|---|---|
| US20200198577A1 (en) | 2020-06-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12052357B2 (en) | Smart lock unlocking method and related device | |
| US10867459B2 (en) | Wireless reader system | |
| KR102612628B1 (en) | Intelligent access system and method for vehicles | |
| US10223849B2 (en) | Intelligent wireless access system and method for a vehicle | |
| US10752192B2 (en) | Intelligent event system and method for a vehicle | |
| US20170259786A1 (en) | Remote Control of Vehicle Functionalities by Means of a Mobile Terminal | |
| JP2021532371A (en) | Systems and methods for determining real-time position | |
| US20210026958A1 (en) | System for adaptive vehicle security and response | |
| CN107027096A (en) | The tele-control system of vehicle | |
| US11423719B2 (en) | System and method for seamless access and intent identification using mobile phones | |
| US11225222B2 (en) | Vehicle access and power management systems and methods via machine learning | |
| US10800381B2 (en) | Vehicle access system battery and security management via interface diversity | |
| KR102602767B1 (en) | Vehicle remote control device and method based on user access direction tracking | |
| CN118435252A (en) | Proximity recognition | |
| CN113313958A (en) | Vehicle control method, device, vehicle, server and storage medium | |
| KR20210005408A (en) | Vehicle sharing system for autonomous vehicle, vehicle Sharing Server for the same | |
| US20240073695A1 (en) | Systems and methods for access control |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: CONTINENTAL AUTOMOTIVE SYSTEMS, INC., MICHIGAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SCHWEGLER, JASON BRIAN;PIERFELICE, MICHAEL ERIC;MARLETT, BRIAN JAMES;REEL/FRAME:048819/0757 Effective date: 20190408 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |